{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:13:11Z","timestamp":1725574391737},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235781"},{"type":"electronic","value":"9783540302070"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30207-0_49","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T15:51:21Z","timestamp":1294415481000},"page":"390-397","source":"Crossref","is-referenced-by-count":6,"title":["Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop"],"prefix":"10.1007","author":[{"given":"Jungtaek","family":"Seo","sequence":"first","affiliation":[]},{"given":"Cheolho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jongsub","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Braden, B., et al.: Recommendations on Queue Management and Congestion Avoidance in the Internet, RFC 2309 (1998)","DOI":"10.17487\/rfc2309"},{"issue":"4","key":"49_CR2","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/90.251892","volume":"1","author":"S. Floyd","year":"1993","unstructured":"Floyd, S., Jacobson, V.: Random Early Detection (RED) gateway for Congestion Avoidance. IEEE\/ACM Transactions on Networking\u00a01(4), 397\u2013413 (1993)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"49_CR3","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MC.2000.839316","volume":"33","author":"L. Garber","year":"2000","unstructured":"Garber, L.: Denial-of-Service Attacks Rip the Internet. IEEE Computer\u00a033(4), 12\u201317 (2000)","journal-title":"IEEE Computer"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Gil, T.M., Poletto, M.: MULTOPS: a data-structure for bandwidth attack detection. In: Proceedings of the 10th USENIX Security Symposium, pp. 23\u201338 (2001)","DOI":"10.21236\/ADA401819"},{"key":"49_CR5","unstructured":"Houle, J.K., Weaver, M.G.: Trends in Denial of Service Attack Technology, CERT Coordination Center (2001)"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Householder, A., Manion, A., Pesante, L., Weaver, M.G.: Managing the Threat of Denial- of-Service Attacks, CERT Coordination Center (2001)","DOI":"10.21236\/ADA636482"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Kargl, F., Maier, J., Weber, M.: Protecting Web Servers from Distributed Denial of Service Attacks. In: Proceedings of the 10th International Conference on World Wide Web, pp. 514\u2013524 (2001)","DOI":"10.1145\/371920.372148"},{"key":"49_CR8","unstructured":"Kulkarni, A.B., Bush, S.F., Evans, S.C.: Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. Technical report 2001CRD176, GE Research and Development Center (2001)"},{"key":"49_CR9","unstructured":"Lawrence Berkeley National Labs Network Research Group. Libpcap"},{"key":"49_CR10","first-page":"81","volume":"1","author":"C. Lee","year":"2003","unstructured":"Lee, C., Noh, S., Choi, K., Jung, G.: Characterizing DDoS Attacks with Traffic Rate Analysis. Proceedings of the IADIS e-Society\u00a01, 81\u201388 (2003)","journal-title":"Proceedings of the IADIS e-Society"},{"key":"49_CR11","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-1-4757-2606-0","volume-title":"An Introduction to Kolmogorov Complexity and Its Applications","author":"M. Li","year":"1997","unstructured":"Li, M., Vitanyi, P.: An Introduction to Kolmogorov Complexity and Its Applications, pp. 506\u2013509. Springer, Heidelberg (1997), Section 7.6"},{"key":"49_CR12","unstructured":"Microsoft: Web Application Stress Tool v1.1 (2000), available-online \n                    \n                      http:\/\/www.microsoft.com\/technet\/itsolutions\/intranet\/downloads\/webstres.asp"},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G.M., Savage, S.: Inferring Internet Denial-of-Service Activity. In: Proceedings of the 10th USENIX Symposium, pp. 9\u201322 (2001)","DOI":"10.21236\/ADA400003"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Storm, P.: Tribe Flood Network (TFN2K) DDoS tool (2000), available on-line \n                    \n                      http:\/\/packetstormsecurity.org\/distributed\/TFN2k_Analysis-1.3.txt","DOI":"10.1016\/S1353-4858(00)02001-8"},{"key":"49_CR15","unstructured":"Ricciuli, L., Lincoln, P., Kakkar, P.: TCP SYN Flooding Defense. Communication Networks and Distributed Systems Modeling and Simulation (2000)"},{"key":"49_CR16","unstructured":"Standard Performance Evaluation Corporation. SPECweb 1999 Benchmark, available on-line \n                    \n                      http:\/\/www.spec.org\/osg\/web99"},{"issue":"1","key":"49_CR17","first-page":"1530","volume":"21","author":"H. Wang","year":"2002","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Detecting SYN Flooding Attacks. Proceedings of IEEE INFOCOM \u2013 The Conference on Computer Communications\u00a021(1), 1530\u20131539 (2002)","journal-title":"Proceedings of IEEE INFOCOM \u2013 The Conference on Computer Communications"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2004 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30207-0_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:40:22Z","timestamp":1558294822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30207-0_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235781","9783540302070"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30207-0_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}